Sciweavers

10666 search results - page 2038 / 2134
» Quantum programming languages
Sort
View
141
Voted
LOGCOM
2010
128views more  LOGCOM 2010»
14 years 10 months ago
Comparing LTL Semantics for Runtime Verification
When monitoring a system wrt. a property defined in a temporal logic such as LTL, a major concern is to settle with an adequate interpretation of observable system events; that is,...
Andreas Bauer 0002, Martin Leucker, Christian Scha...
LRE
2010
145views more  LRE 2010»
14 years 10 months ago
Annotation of multiword expressions in the Prague dependency treebank
In this article we want to demonstrate that annotation of multiword expressions in the Prague Dependency Treebank is a well defined task, that it is useful as well as feasible, an...
Eduard Bejcek, Pavel Stranák
TDSC
2010
172views more  TDSC 2010»
14 years 10 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...
TKDE
2010
161views more  TKDE 2010»
14 years 10 months ago
A Deductive Spreadsheet System for End Users
We exploit the spreadsheet metaphor to make deductive problem-solving methods available to the vast population of spreadsheet end users. In particular, we show how the function-bas...
Marcelo Tallis, Robert M. Balzer
113
Voted
ADVAI
2010
110views more  ADVAI 2010»
14 years 9 months ago
Using Genetic Algorithms to Represent Higher-Level Planning in Simulation Models of Conflict
The focus of warfare has shifted from the Industrial Age to the Information Age, as encapsulated by the term Network Enabled Capability. This emphasises information sharing, comma...
James Moffat, Susan Fellows
« Prev « First page 2038 / 2134 Last » Next »